{"image_url":null,"categories":["\u5236\u5ea6: CRA\u6cd5 (EU)","\u6cd5\u5f8b: \u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u6cd5 / CRA / Cyber Resilience Act (EU)","SBOM","\u30d6\u30ed\u30b0: NEC\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ed\u30b0","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f01\u696d: NEC"],"type":"rich","description":"\u3010\u8981\u70b9\u3011 \u25ceEU\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u6cd5\u5bfe\u5fdc\u306b\u5411\u3051\u3001SBOM\u3067\u6700\u4e0a\u4f4d\u4f9d\u5b58\u95a2\u4fc2\u3092\u3069\u3046\u8a18\u8ff0\u3059\u3079\u304d\u304b\u3092\u6574\u7406\u3057\u3001CycloneDX\u3092\u7528\u3044\u305f\u5177\u4f53\u4f8b\u3068\u5224\u65ad\u304c\u96e3\u3057\u3044\u30b1\u30fc\u30b9\u3092\u8003\u5bdf\u3057\u305f (NEC\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ed\u30b0)","provider_name":"Hatena Blog","version":"1.0","provider_url":"https://hatena.blog","width":"100%","published":"2026-01-23 00:00:00","blog_title":"TT Security Log","title":"EU\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u6cd5\u3092\u6e80\u305f\u3059SBOM\u4f9d\u5b58\u95a2\u4fc2\u306e\u8a18\u8ff0\u65b9\u6cd5\u306e\u8003\u5bdf","url":"https://security-log.hatenablog.com/entry/2026/01/23/000000_1","author_name":"tanigawa","author_url":"https://blog.hatena.ne.jp/tanigawa/","height":"190","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2F2026%2F01%2F23%2F000000_1\" title=\"EU\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u6cd5\u3092\u6e80\u305f\u3059SBOM\u4f9d\u5b58\u95a2\u4fc2\u306e\u8a18\u8ff0\u65b9\u6cd5\u306e\u8003\u5bdf - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","blog_url":"https://security-log.hatenablog.com/"}